4: www vs internet - The Internet is the global system of interconnected computer networks that uses protocols to connect devices worldwide. The World Wide Web is an information system (of pages, programs, and files) that is accessible over the Internet.
9: analog audio signal - Analog signals are sampled digitally at discrete intervals over time. These samples, like all digital data, are represented at the lowest level as a sequence of bits.
23: internet scaled - The Internet was designed to be scalable, using open protocols to easily connect additional computing devices to the network.
30: data packets - Data transmitted on the Internet is broken into packets and then reassembled upon arrival. Packets may travel along different paths, arriving at the destination in order, out of order, or not at all.
48: rogue access point - A rogue access point is a wireless access point that gives unauthorized access to secure networks. Data sent over public networks can be intercepted, analyzed, and modified. One way that this can happen is through a rogue access point.
50: symmetric encryption - Symmetric encryption uses a single key for both encryption and decryption of data. Since the key can be used to unlock the data, it should be kept secret.
55: append/ insert - Insert command inserts the element specified into the location (index) specified in parathesis, while append simply adds to the end of the list.
MCQ 2021:
4: www vs internet - The Internet is the global system of interconnected computer networks that uses protocols to connect devices worldwide. The World Wide Web is an information system (of pages, programs, and files) that is accessible over the Internet. 9: analog audio signal - Analog signals are sampled digitally at discrete intervals over time. These samples, like all digital data, are represented at the lowest level as a sequence of bits. 23: internet scaled - The Internet was designed to be scalable, using open protocols to easily connect additional computing devices to the network. 30: data packets - Data transmitted on the Internet is broken into packets and then reassembled upon arrival. Packets may travel along different paths, arriving at the destination in order, out of order, or not at all. 48: rogue access point - A rogue access point is a wireless access point that gives unauthorized access to secure networks. Data sent over public networks can be intercepted, analyzed, and modified. One way that this can happen is through a rogue access point. 50: symmetric encryption - Symmetric encryption uses a single key for both encryption and decryption of data. Since the key can be used to unlock the data, it should be kept secret. 55: append/ insert - Insert command inserts the element specified into the location (index) specified in parathesis, while append simply adds to the end of the list.